Publisher
Springer Nature Singapore
Reference18 articles.
1. Rajkumar G, Malemath V (2017) Video steganography: secure data hiding technique. Int J Comput Netw Inform Secur 9:38–45. https://doi.org/10.5815/ijcnis.2017.09.05
2. Kumar H, Singh A (2016) Internet of Things: a comprehensive analysis and security implementation through elliptic curve cryptography. Int J Curr Eng Technol 6(2):498–502
3. Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A (2021) Image steganography: a review of the recent advances. IEEE Access 9:23409–23423. https://doi.org/10.1109/ACCESS.2021.3053998
4. Hossain S, Mukhopadhyay S, Ray B, Ghosal SK, Sarkar R (2022) A secured image steganography method based on ballot transform and genetic algorithm. Multimed Tools Appl 81:38429–38458
5. Sakshi S, Verma S, Chaturvedi P, Yadav SA (2022) Least significant bit steganography for text and image hiding. In: 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM), pp 415–421